Electrical Engineering and Computer Science

CSE News

The 2016 US Election Wasnt Hacked, but the 2020 Election Could Be

Prof. Alex Halderman is quoted in this article which reports on the recent Chaos Communication Congress. "Developing an attack for one of these machines is not terribly difficult," says Prof. Halderman. "I and others have done it again and again in the laboratory. All you need to do is buy one government surplus on eBay to test it out." [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

CSE Alumnus Peter Wurman Named VP of Engineering at Cogitai

Cogitai, the artificial intelligence start-up focused on next generation machine learning technologies, has announced that Peter Wurman (MSE ME 88, MS CSE 96, PhD CSE 99) has joined the company as Vice President of Engineering. Wurman is also a member of the CSE National Advisory Board. Cogitai was cofounded by Prof. Satinder Singh Baveja. [Full Story]

Related Topics:  Alumni  Artificial Intelligence  Lab-Artificial Intelligence  

Poker Is the Latest Game to Fold Against Artificial Intelligence

Prof. Michael Wellman is quoted in this article on new AI systems that are able to best top-level human opponents in games of poker. "What's really new for such a complex game is being able to effectively compute the action to take in each situation as it is encountered, rather than having to work through a simplified form of the entire tree of game possibilities offline," says Prof. Wellman. Prof. Wellman is also quoted on the same subject in this article in Wired. [Full Story]

Related Topics:  Artificial Intelligence  Lab-Artificial Intelligence  Wellman, Michael  

Prof. Kevin Fu to deliver endowed Dr. Dwight Harken Memorial Lecture on medical device security

Prof. Kevin Fu has been selected to give the annual Dwight E. Harken Lecture during the AAMI 2017 Conference & Expo in Austin, TX, June 912. Prof. Fu directs the Archimedes Center for Medical Device Security and the Security and Privacy Research Group at Michigan and is also CEO and chief scientist of Virta Labs, Inc. [Full Story]

Related Topics:  Fu, Kevin  Lab-Computer Engineering (CE Lab)  Medical Device Security  Security (Computing)  

Five things that got broken at the oldest hacking event in the world

Chaos Communications Congress is the world's oldest hacker conference, and Europe's largest. Every year, thousands of hackers gather in Hamburg to share stories, trade tips and discuss the political, social and cultural ramifications of technology. This story quotes Prof. J. Alex Halderman, who with his student Matt Bernhard, has studied the security of the past US presidential election. [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

Call for Ideas: Recuiting and Retaining Women and Underrepresented Minorities in Computer Science

Girls Encoded is a series of events run by faculty and students at CSE that are aimed at increasing the number of women and underrepresented minorities in computing. Girls Encoded invites the submission of your proposals for initiatives to recruit or retain women and minorities in computer science. [Full Story]

Related Topics:  Diversity and Outreach  Mihalcea, Rada  Women in Computing  

Visually Impaired Teen, Engineering Students Create Tech for the Blind

Dr. David Chesney's EECS 481 Software Engineering class helps, and is helped by, India West, a passionate young woman who lost her eyesight at an early age. Together, they conceptualize and develop technology for the visually impaired. [Full Story]

Related Topics:  Chesney, David  Engineering for the Greater Good  Undergraduate Students  

Popular Intro CS Course Continues to Grow; Over 870 Students Present Final Projects at Showcase

Over 870 students in EECS 183, Elementary Programming Concepts, displayed their final projects for friends, family, classmates, and industry sponsors in a series of project showcases in the Michigan League Ballroom. The course teaches undeclared students and non-CS majors the fundamentals of algorithmic thinking and programming. [Full Story]

Related Topics:  Arthur, William  Dorf, Mary Lou  Undergraduate Students  

Peter M. Chen to Serve as Interim Chair of Computer Science and Engineering

Prof. Peter M. Chen, Arthur F. Thurnau Professor of Electrical Engineering and Computer Science, will assume the role of Interim Chair of Computer Science and Engineering effective January 1, 2017. [Full Story]

Related Topics:  Chen, Peter M.  Lab-Software Systems  

Todd Austin Elected IEEE Fellow for Contributions to Simulation Techniques and Resilient System Design in Computer Architecture

Prof. Todd Austin has been named an IEEE Fellow, Class of 2017, "for contributions to simulation techniques and resilient system design in computer architecture." Prof. Austin is a recognized leader in the area of computer architecture research, having delivered several seminal papers that have changed the landscape of research in the field, and where he is the 12th all-time most sited author and the leader of the field's largest research center. [Full Story]

Related Topics:  Austin, Todd  Lab-Computer Engineering (CE Lab)  

Prof. Trevor Mudge Named ACM Fellow for Contributions to Power Aware Computer Architecture

Bredt Family Professor of Engineering Trevor Mudge has been elected a Fellow of the Association for Computing Machinery (ACM) "for contributions to power aware computer architecture." His inventive approaches have led to new technologies that reduce the energy consumption of microprocessors while maintaining acceptable performance in an era of exponential growth in embedded processors and system-on-chip designs. [Full Story]

Related Topics:  Lab-Computer Engineering (CE Lab)  Mudge, Trevor  

Winter 2017: Theory and Practice of Data Compression

Course No.: EECS 553
Credit Hours: 3 credits
Instructor: David Neuhoff
Prerequisites: EECS 501, Probability and Random Processes

Course Description:
Data compression (also called source coding) is the process of creating binary representations of data from sources such as speech, images, audio, video or text. This course gives a broad introduction to the theory and practice of lossy compression, where perfect reproductions are not possible or require too many bits (for example for speech, images, audio, video), and some introduction to lossless compression, where perfect reproductions are required (for example for text or other discrete data). Particular attention is paid to compressing images, speech and video.

The lossy compression methods include a number of quantization techniques: scalar, vector, predictive (e.g. DPCM), transform (e.g., JPEG, MPEG, H.26X), subband (e.g., MP3, wavelet, JPEG2000), predictive and adaptive quantizers (e.g., CELP as used in cell phones to compress speech). The theory is mainly high-resolution quantization theory.

The lossless compression methods include Huffman, conditional, run-length, Lempel-Ziv, and arithmetic codes. The theory is entropy theory.

Students gain experience in data compression via a term project.

The course is oriented toward first and second year graduate students. No previous introduction to data compression is presumed. [More Info]

Winter 2017: Channel Coding Theory and Applications

Course No.: EECS 650
Credit Hours: 3 credits
Instructor: Hessam Mahdavifar
Prerequisites: (Advisory) EECS 501 and MATH 419

Course Description:
Coding theory is the science of the systematic study of structured sets called codes, providing reliable communications and data storage in noisy environments. Today, error-correcting codes are among the fundamental parts of any communication system and data storage system.

The classical approach to construct such structured sets has been to consider certain algebraic objects such as vector spaces and finite fields. In the first part of this course, we cover some required background to study linear binary block codes and algebraic codes over finite fields. In particular, some of the well-known classical codes such as Reed-Solomon codes and BCH codes are studied.

Another approach to construct structured sets or codes has been to exploit properties of certain graphical models and trellises. This approach was essentially born by the invention of convolutional codes in 50s but was mostly discarded till 90s due to the lack of computational power. The invention of turbo codes and the re-discovery of low-density parity-check codes in 90s led to the birth of a new subfield of coding theory called modern coding theory. In the second part of the course, we study some essential aspects of modern coding theory.

A classical goal of information theory set by Shannon 70 years ago has been to construct explicit codes with practical encoder and decoder that achieve the fundamental limit of channel capacity. This goal was finally accomplished by the invention of polar codes in 2009. This has revolutionized the field of coding and information theory as many open problems have been solved using polar codes and the new notion of channel polarization. Besides being asymptotically optimal, polar codes have also been shown to perform very well at short block length which has led to their adoption in 5G wireless communication systems. In the third part of the course, we study polar codes and channel polarization together with practical aspects of their implementation. [More Info]

U-M researchers create helpful tool for Flint residents during ongoing water crisis

This video and text news item describes MyWater-Flint, the app and website designed by UM researchers to help Flint residents with data about the ongoing water crisis. [Full Story]

Related Topics:  Abernethy, Jake  Big Data  Lab-Artificial Intelligence  Machine Learning  

Prof. Jason Flinn Named ACM Fellow for Contributions to Mobile Computing and Distributed Systems

Prof. Jason Flinn has been elected a Fellow of the Association for Computing Machinery (ACM) for contributions to mobile computing and reliable distributed systems. His research is in the area of operating systems, mobile computing, storage, and distributed systems. He is currently interested in creating software systems that allow concurrent programs to execute more reliably on multicore computers, as well as in enabling demanding applications to run on small, mobile computers and smartphones. [Full Story]

Related Topics:  Flinn, Jason  Lab-Software Systems  

Professor Emerita Lynn Conway Elected Fellow of the American Association for the Advancement of Science

Professor Emerita Lynn Conway has been elected Fellow of the American Assocation for the Advancement of Science. Fellows are recognized for their efforts toward advancing science applications that are deemed scientifically or socially distinguished. Prof. Conway has made groundbreaking and fundamental contributions to Very Large Scale Integration (VLSI) design and production of integrated circuits. [Full Story]

Related Topics:  Conway, Lynn  

Google-funded Flint Water App Helps Residents Find Lead Risk, Resources

Faculty and students at Michigan's Ann Arbor and Flint campuses have released an app that provides Flint residents with data about the ongoing water crisis. The app was developed with support from Google.org. [Full Story]

Related Topics:  Abernethy, Jake  Big Data  Lab-Artificial Intelligence  Machine Learning  

Valeria Bertacco Elected IEEE Fellow for Contributions to Computer-aided Verification and Reliable System Design

Prof. Valeria Bertacco has been named an IEEE Fellow, Class of 2017, "for contributions to computer-aided verification and reliable system design." Prof. Bertacco is a highly noted researcher in the area of computer architecture and is Director of the department's Computer Engineering (CE) Lab. [Full Story]

Related Topics:  Bertacco, Valeria  Lab-Computer Engineering (CE Lab)  Women in Computing  

Trump Allowed to Join Fight Against Pennsylvania Recount

A battle over whether or not a recount of ballots cast in Pennsylvania during the recent presidential campaign is taking place. In the case made for a recount, hackers could have easily infected Pennsylvanias voting machines with malware designed to lay dormant for weeks, pop up on Election Day and then erase itself without a trace, according to Prof. J. Alex Halderman. [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

Yi-Jun Chang Selected for Chia-Lun Lo Fellowship

Yi-Jun Chang, a graduate student in the Computer Science and Engineering program, has received a Chia-Lun Lo Fellowship for 2016-17. The Chia-Lun Lo Fellowship assists assists outstanding students in Rackham programs who have earned a previous degree from a university in Taiwan and who may be ineligible for other kinds of support because of citizenship. Chang's research interest is in complexity theory of distributed computing. [Full Story]

Related Topics:  Graduate Students  Pettie, Seth  

Mount and Wu Scholarship Rewards Extracurriculars

Brian Mount (BSE CE 01, MSE CSE 03), Melissa Wu (BSE Civ 03), and Michelle Wu (BSE ChE 01), have recently endowed the Mount and Wu Families Scholarship. This fund will provide need-based support for in-state, undergraduate students with a preference for those engaged in College of Engineering extracurricular activities. [Full Story]

Related Topics:  Alumni  

Winter 2017: Advanced Topics and the Design of Power Electronics

Course No.: EECS 598
Credit Hours: 3 credits
Instructor: Al Avestruz
Prerequisites: EECS 418 and EECS 460 or equivalents

Course Description:
This class will address some advanced topics and techniques in power electronics and the craft of design through case studies. [More Info]

Winter 2017: EECS 598 - Optics and Quantum Spectroscopy of Semiconductors

Course No.: EECS 598
Credit Hours: 3 credits
Instructor: Mack Kira
Prerequisites: PHYSICS 240 and (EECS 334 or 434 or 320 or 540)

Course Description:
This lecture will provide a pragmatic and brief introduction to solidstate theory, manybody formalism, and semiconductor quantum optics to explore pragmatic possibilities for nanotechology. [More Info]
Related Topics:  Course  

Vote Recount Push Advances, but Reversing Trumps Win Is Unlikely

This article in the New York Times reports on the uneven progress toward recounts in three key states for the recent presidential election. Led by Green Party candidate Jill Stein, the recounts were inspired by a call from leading security experts, including Prof. J. Alex Halderman. [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

Want to Know if the Election was Hacked? Look at the Ballots

In this post, Prof. J. Alex Halderman sets the record straight regarding what he and other leading election security experts have actually been saying to the Clinton campaign and everyone else whos willing to listen. He describes a situation where malware could be a factor in the vote totals during the presidential election. [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

Trump election: Activists call for recount in battleground states

The BBC reports on the call by leading computer scientists, including Prof. J. Alex Halderman, for a recount of votes in the presidential election in three swing states. Their analysis shows that Clinton performed worse in counties that relied on electronic voting machines compared to paper ballots and optical scanners. [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

Computer scientists urge Clinton campaign to challenge election results

CNN reports that a group of top computer scientists, including Prof. J. Alex Halderman, have urged Hillary Clinton's campaign to call for a recount of vote totals in Wisconsin, Michigan and Pennsylvania. The computer scientists believe they have found evidence that vote totals in the three states could have been manipulated or hacked and presented their findings to top Clinton aides on a call last Thursday. [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

Winter 2017: Waves & Imaging in Random Media

Course No.: EECS 598
Credit Hours: 3 credits
Instructor: John Schotland
Prerequisites: Basic partial differential equations; some knowledge of probability theory

Course Description:
This is a special topics course. The focus is on the theory of wave propagation in inhomogeneous media in various asymptotic regimes including: (i) geometrical optics of high-frequency waves (ii) homogenization of low-frequency waves in periodic and random media (iii) radiative transport and diusion theory for high-frequency waves in random media. Applications to inverse problems in imaging will be considered. The necessary tools from asymptotic analysis, scattering theory and probability will be developed as needed. The course is meant to be accessible to graduate students in mathematics, physics and engineering. [More Info]
Related Topics:  Course  

Experts Urge Clinton Campaign to Challenge Election Results in 3 Swing States

Leading computer security experts with an interest in election integrity, including Prof. J. Alex Halerman, have called for a recount of the votes cast in the presidential election in three key swing states. They believe they have found evidence that results in Wisconsin, Michigan, and Pennsylvania may have been manipulated. [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

Vulnerable connected devices a matter of "homeland security"

This article describes the security ramifications of unprotected IoT devices such as internet-connected cameras, video recorders on the larger Internet. It quotes Prof. Kevin Fu on the effort that would be required to secure this new ecosystem. [Full Story]

Related Topics:  Fu, Kevin  Internet of Things  Lab-Computer Engineering (CE Lab)  Security (Computing)  

Professor to Congress: "Internet of Things security is woefully inadequate"

As the Internet of Things grows around us, so do the threat of cybersecurity breaches severe enough to shut down hospitals and other vital infrastructure. This is the message that Prof. Kevin Fu delivered to lawmakers at a congressional hearing this week. [Full Story]

Related Topics:  Fu, Kevin  Lab-Computer Engineering (CE Lab)  Security (Computing)  

After Dyn cyberattack, lawmakers seek best path forward

In a hearing hosted by the House Energy and Commerce Committee, University of Michigan professor Kevin Fu, Level 3 Communications Chief Security Officer Dale Drew and computer security luminary Bruce Schneier briefed Congress on the challenges posed by insecure internet-connected devices and whether they believe the government can make a difference. This article provides a summary of the proceedings. [Full Story]

Related Topics:  Fu, Kevin  Lab-Computer Engineering (CE Lab)  Security (Computing)  

How You Speak To Siri & Alexa Matters More Than You Think Here's Why

Prof. Rada Mihalcea is quoted in this story about sexism and today's virtual assistants such as Amazon's Alexa, Apple's Siri and Microsoft's Cortana. [Full Story]

Related Topics:  Lab-Artificial Intelligence  Mihalcea, Rada  Women in Computing  

Regulate cybersecurity or expect a disaster, experts warn Congress

The U.S. government must demand that all internet-connected devices have built-in security, according to experts including Prof. Kevin Fu who warned Congress that the country could soon face a disastrous, lethal cyberattack. [Full Story]

Related Topics:  Fu, Kevin  Internet of Things  Lab-Computer Engineering (CE Lab)  Security (Computing)  

Winter 2017: Organic Electronics: Fundamentals

Course No.: EECS 598
Credit Hours: 3 credits
Instructor: Steve Forrest
Prerequisites: Senior level quantum physics, electricity and magnetism

Course Description:
In this course, we will trace the history, science and modern applications of organic electronic technology. [More Info]
Related Topics:  Course  

Winter 2017: Formal Verification of Hardware and Software Systems

Course No.: EECS 598
Credit Hours:
Instructor: Karem Sakallah
Prerequisites:

Course Description:
This course explores the latest advances in automated proof methods for checking whether or not certain properties hold under all possible executions of a complex hardware or software system. [More Info]

Winter 2017: Multidisciplinary Capstone Design Project - Supplemental Information

Course No.: EECS498-006 and EECS 498-007
Credit Hours: 3 credits
Instructor: Anthony Grbic or Greg Wakefield
Prerequisites: See PDF

Course Description:
See attached PDF [More Info]

Winter 2017: Multidisciplinary Capstone (MDE) Design Pilot

Course No.: EECS 498
Credit Hours: 3 or 4 credits
Instructor: Brian Gilchrist
Prerequisites:

Course Description:
EECS students, together with ME and MSE students, work on common, interesting, significant major design experience (MDE) projects. This pilot douse is about providing students real-world, multidisciplinary design project opportunities to satisfy their MDE requirement and for ECE masters students interested in meaningful project experiences.

For WN17, we will have several projects with a biomedical focus as well as energy, sports, spaceflight, and other areas needing EECS students (e.g. sensor/electronics, embedded systems, controls, and wireless). Please contact Prof. Gilchrist with questions. [More Info]

Winter 2017: Internet Foundations

Course No.: EECS 398
Credit Hours: 1 credit
Instructor: Mohammed Islam
Prerequisites: ENGR 101 or EECS 183

Course Description:
This course introduces students to the fundamentals of the internet. You use the internet every day, and in this course we permit you to look under the hood of the internet. We start by reviewing the differences between various applications, such as world wide web, skype, and Bit-Torrent. The 4-layer internet model will be explained, which includes the application, transport, network and link layers. Internet protocol and TCP/IP communication will be reviewed, along with a detailed discussion of how packet switching and routers work. The link and physical layer description will include explanations of how WiFi and Ethernet networks work [More Info]
Related Topics:  Course  

Kevin Fu Testifies on the Role of Connected Devices in Recent Cyber Attacks

Prof. Kevin Fu testified before the House Energy and Commerce Committee on the role of connected devices in recent cyber attacks on Wednesday, Nov 16, 2016. Follow the link to see a video of the proceedings. [Full Story]

Related Topics:  Fu, Kevin  Lab-Computer Engineering (CE Lab)  Security (Computing)  

Provost and former CSE Assoc. Chair Martha Pollack named president at Cornell University

Former Associate Chair of CSE and Dean of the School of Information Martha Pollack has been named President of Cornell University. Our congratulations! [Full Story]

Related Topics:  Pollack, Martha  

Winter 2017: Motion Planning

Course No.: EECS 598-003
Credit Hours: 3 credits
Instructor: Dmitry Berenson
Prerequisites: A linear algebra class and significant programming experience

Course Description:
This course will cover the major topics of motion planning including (but not limited to) planning for manipulation with robot arms and hands, mobile robot path planning with non-holonomic constraints, multi-robot path planning, high-dimensional sampling-based planning, and planning on constraint manifolds. Students will implement motion planning algorithms in open-source frameworks, read recent literature in the field, and complete a project that draws on the course material. [More Info]
Related Topics:  Course  

The Network Standard Used in Cars Is Wide Open to Attack

As automobiles grow increasingly computerized, the security of the network for in-vehicle communication is a growing security concern. New research by Prof. Kang G. Shin and graduate student Kyong-Tak Cho demonstrates that the controller area network (CAN) protocol implemented by in-vehicle networks has a new and potentially quite dangerous vulnerability. [Full Story]

Related Topics:  Graduate Students  Lab-Software Systems  Networks and Networking  Security (Computing)  Shin, Kang G.  

Winter 2017: Social Computing Systems

Course No.: EECS 498-002
Credit Hours: 4 credits
Instructor: Walter Lasecki
Prerequisites: EECS 493 or permission of instructor

Course Description:
This course will be based on reading from the social computing research literature. Practical projects will give students experience using and creating online social computing platforms. A significant team-based final project component will let students gain experience designing and building the types of systems we will study. Students will select a topic, and then propose, design, and build a real system. [More Info]

2016 CSE Graduate Student Honors Competition Highlights Outstanding Research

CSE held its thirteenth annual CSE Graduate Student Honors Competition on November 9, 2016. Five students presented on an aspect of their research; Shaizeen Aga was selected as the top presenter this year. [Full Story]

Related Topics:  Graduate Students  Women in Computing  

How Safe is Your Smart Home?

The Smart Home sounds like a great idea. But is it an unsafe home? "I would be cautious, overall," says Prof. Atul Prakash. "The technology is relatively new. Hardware is probably a little bit ahead of the software at this point, and a lot of vulnerabilities we are seeing are primarily on the software side of things." Read more and listen to the full interview here. [Full Story]

Related Topics:  Lab-Software Systems  Prakash, Atul  Security (Computing)  

Alumnus Tim Howes Chosen for Arbor Networks PhD Research Impact Lecture and Award

Michigan alumnus Tim Howes (BSE Aero 85, MSE PhD CSE 87 96) has been selected by the College of Engineering for the Arbor Networks PhD Research Impact Award. Dr. Howes' doctoral research focused on Internet directory services, and he co-invented LDAP, the Internet directory protocol, while a graduate student at U-M. [Full Story]

Related Topics:  Alumni  Networks and Networking  

Winter 2017: Hands On Robotics

Course No.: EECS 498
Credit Hours: 4 credits
Instructor: Shai Revzen
Prerequisites: MATH 216 or permission of instructor

Course Description:
Take Hands On Robitics, a design course where you learn robotics by building robots using the CKBot modular robot system! Covering concepts in robotics from kinematics, control, to programming. [More Info]
Related Topics:  Course  

Winter 2017: Quantum Information, Probability and Computing

Course No.: EECS 598
Credit Hours: 3 credits
Instructor: Sandeep Pradhan
Prerequisites: Permission of instructor

Course Description:
Extended introduction and overview of the field of quantum information, quantum probability and quantum computing [More Info]
Related Topics:  Course  

Winter 2017: Grid Integration of Renewable Energy Sources

Course No.: EECS 498/598
Credit Hours: 4 credits
Instructor: Ian Hiskens
Prerequisites: EECS 215 or EECS 314

Course Description:
This course will consider large-scale integration of renewable generation in electricity grids. [More Info]
Related Topics:  Course  

All CSE News for 2017